ETFOptimize | High-performance ETF-based Investment Strategies

Quantitative strategies, Wall Street-caliber research, and insightful market analysis since 1998.


ETFOptimize | HOME
Close Window

JFrog Research Uncovers Weak Links in MLOps & Security Usage within Enterprise Software Supply Chains

New report reveals multiple disconnects between senior executives and hands-on practitioners globally, amplifying gaps in standardized use of AI/ML, security detection and remediation technologies

JFrog Ltd. (“JFrog”) (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, today unveiled the findings of a new report exposing disparities in MLOps and security perceptions between leadership and frontline teams that is increasing the risk of software supply chain (SSC) attacks around the globe.

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20240718899029/en/

New report by JFrog reveals multiple disconnects between senior executives and hands-on practitioners globally, amplifying gaps in standardized use of AI/ML, security detection and remediation technologies. (Graphic: Business Wire)

New report by JFrog reveals multiple disconnects between senior executives and hands-on practitioners globally, amplifying gaps in standardized use of AI/ML, security detection and remediation technologies. (Graphic: Business Wire)

Software supply chain security breaches are experiencing a significant uptick, according to a recent IDC survey showing a staggering 241% increase in such attacks year-over-year1. Surprisingly, only 30% of the survey respondents identified the need to address vulnerabilities in their software supply chain as a top security concern.

“The complexity of today’s software supply chain poses unprecedented risks. Despite leadership efforts to enable frontline teams with the right equipment, developers are struggling to improve efficiency and accelerate productivity due to tool sprawl, lengthy open source and ML model approvals, plus audit and compliance checks,” said Moran Ashkenazi, SVP & CISO, JFrog. “This discrepancy highlights the urgency for organizations to rethink their security strategies, focus more on AI/ML components, and align executives and doers on a mission to fortify their software supply chains.”

JFrog’s new report reveals several disparities between security executives and frontline software teams concerning malicious open-source package detection, AI/ML integration, and code-level security scans, including:

  • 92% of executives claim their organizations possess tools to detect malicious open-source packages, while only 70% of developers agree with this statement.
  • Over 90% of executives believe they are using ML models in their software applications, but only 63% of developers confirm that is the case.
  • 88% of executives believe AI/ML tools are being used for security scanning and remediation processes, however only 60% of DevSecOps teams report they are using these tools.
  • 67% of executives believe code-level security scans are conducted regularly, while only 41% of developers confirm such is true.

JFrog’s study also delves into regional disparities in software supply chain security, visibility, and use of AI/ML technologies such as:

  • Awareness of Security Solutions: 14% of EMEA respondents were unaware of tools for identifying malicious open-source packages, in contrast to lower rates in the US (9%) and Asia (1%), highlighting a substantial disconnect in EMEA's security strategies and operational understanding.
  • Adoption of AI/ML Models: Only 82% of EMEA respondents reported using AI/ML models, compared to 91% in the US and 99% in Asia. This variance may point to Europe's risk-averse environment influenced by strict regulations, while we see faster adoption of AI/ML technologies in the US.

For deeper insights on how executives can augment collaboration with developers, security, and data science teams to better secure their software supply chains download the full report. You can also register to join JFrog’s Field CISO, Paul Davis, and JFrog’s CIO, Aran Azarzar, for a webinar, Know The Enemy: What Execs Need To Understand To Secure Their Software Supply Chain,” detailing the complexities, promising solutions, and recommendations for better managing and securing software supply chains.

Like this Story? Share this: @JFrog research shows critical gaps in visibility between business divisions, execs, & doers, increasing risk of #softwaresupplychain attacks. Learn more: https://bit.ly/3WplWbl #DevOps #DevSecOps #cybersecurity #CVEs #AI/ML

About JFrog

JFrog Ltd. (Nasdaq: FROG) is on a mission to create a world of software delivered without friction from developer to device. Driven by a “Liquid Software” vision, the JFrog Software Supply Chain Platform is a single system of record that powers organizations to build, manage, and distribute software quickly and securely, ensuring it is available, traceable, and tamper-proof. The integrated security features also help identify, protect, and remediate against threats and vulnerabilities. JFrog’s hybrid, universal, multi-cloud platform is available as both self-hosted and SaaS services across major cloud service providers. Millions of users and 7K+ customers worldwide, including a majority of the Fortune 100, depend on JFrog solutions to securely embrace digital transformation. Learn more at www.jfrog.com or follow us on X @JFrog.

___________________________

1IDC, “IDC Helps Organizations Navigate Software Supply Chain Security with New Industry-Leading Research,” 15 June 2023, https://www.idc.com/getdoc.jsp?containerId=prUS50913123

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.


 

IntelligentValue Home
Close Window

DISCLAIMER

All content herein is issued solely for informational purposes and is not to be construed as an offer to sell or the solicitation of an offer to buy, nor should it be interpreted as a recommendation to buy, hold or sell (short or otherwise) any security.  All opinions, analyses, and information included herein are based on sources believed to be reliable, but no representation or warranty of any kind, expressed or implied, is made including but not limited to any representation or warranty concerning accuracy, completeness, correctness, timeliness or appropriateness. We undertake no obligation to update such opinions, analysis or information. You should independently verify all information contained on this website. Some information is based on analysis of past performance or hypothetical performance results, which have inherent limitations. We make no representation that any particular equity or strategy will or is likely to achieve profits or losses similar to those shown. Shareholders, employees, writers, contractors, and affiliates associated with ETFOptimize.com may have ownership positions in the securities that are mentioned. If you are not sure if ETFs, algorithmic investing, or a particular investment is right for you, you are urged to consult with a Registered Investment Advisor (RIA). Neither this website nor anyone associated with producing its content are Registered Investment Advisors, and no attempt is made herein to substitute for personalized, professional investment advice. Neither ETFOptimize.com, Global Alpha Investments, Inc., nor its employees, service providers, associates, or affiliates are responsible for any investment losses you may incur as a result of using the information provided herein. Remember that past investment returns may not be indicative of future returns.

Copyright © 1998-2017 ETFOptimize.com, a publication of Optimized Investments, Inc. All rights reserved.